The Complete Cyber Security Course : Hackers Exposed! (Last updated 3/2024)

Posted By: ELK1nG

The Complete Cyber Security Course : Hackers Exposed!
Last updated 3/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.30 GB | Duration: 12h 5m

Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC

What you'll learn

An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness & govenment mass surveillance.

Start a career in cyber security. Become a cyber security specialist.

The very latest up-to-date information and methods.

We cover operating system security, privacy, and patching - On Windows, MacOS and Linux.

Explore the threat landscape - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more.

You will master encryption in an easy to follow crash course.

Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, isolation, virtual machines, Whonix and Qubes OS.

You will learn about nation state secret tracking and hacking infrastructure.

A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed.

Requirements

A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.

Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.

Description



Learn a practical skill-set in defeating all online
threats, including - advanced hackers,
trackers, malware, zero days, exploit kits, cybercriminals and more.
Become a Cyber Security Specialist - Go from a beginner to advanced in this easy to
follow expert course.  
Covering all major platforms - Windows 7, Windows
8, Windows 10, MacOS and Linux.
This course covers the fundamental building blocks of your
required skill set - You will understand the threat and vulnerability landscape
through threat modeling and risk assessments.
We explore the Darknet and mindset of the cyber
criminal. Covering malware, exploit kits, phishing, zero-day
vulnerabilities and much more.


You will learn about the global tracking and
hacking infrastructures that nation states run. Covering the NSA, FBI, CIA,
GCHQ, China’s MSS and other intelligence agencies capabilities.

You will understand the foundations of operating
system security and privacy functionality. A close look at the new Windows
10 privacy issues and how to best mitigate them.
There is a complete easy to follow crash course on
encryption, how encryption can be bypassed and what you can do to mitigate
the risks.
Master defenses against phishing, SMShing, vishing,
identity theft, scam, cons and other social engineering threats.
Finally we cover the extremely important, but underused
security control of isolation and compartmentalization. Covering sandboxes,
application isolation, virtual machines, Whonix and Qubes OS.
This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.  

Overview

Section 1: Introduction

Lecture 1 Welcome and Introduction to the Instructor!

Lecture 2 Security Quick Win!

Lecture 3 Goals and Learning Objectives - Volume 1

Lecture 4 Target Audience

Lecture 5 Study Recommendations

Lecture 6 Course updates

Lecture 7 Cyber Security and Ethical Hacking Careers

Section 2: know Yourself - The Threat and Vulnerability Landscape

Lecture 8 Theory and Practical

Lecture 9 Goals and Learning Objectives

Lecture 10 Protect What You Value

Lecture 11 What is Privacy, Anonymity and Pseudonymity

Lecture 12 Security, Vulnerabilities, Threats and Adversaries

Lecture 13 Asset Selection

Lecture 14 Threat Modeling and Risk Assessments

Lecture 15 Security vs Privacy vs Anonymity - Can we have it all?

Lecture 16 Confidentiality, Integrity and Availability - (Security Attributes)

Lecture 17 Defense In Depth

Lecture 18 The Zero Trust Model

Section 3: Know Your Enemy - The Current Threat and Vulnerability Landscape

Lecture 19 Goals and Learning Objectives

Lecture 20 Why You Need Security – The Value Of A Hack

Lecture 21 The Top 3 Things You Need To Stay Safe Online

Lecture 22 Security Bugs and Vulnerabilities - The Vulnerability Landscape

Lecture 23 Hackers, crackers and cyber criminals

Lecture 24 Malware, viruses, rootkits and RATs

Lecture 25 Spyware, Adware, Scareware, PUPs & Browser hijacking

Lecture 26 What is Phishing, Vishing and SMShing

Lecture 27 Spamming & Doxing

Lecture 28 Social engineering - Scams, cons, tricks and fraud

Lecture 29 CPU Hijackers - Crypto Mining Malware and Cryptojackers

Lecture 30 Darknets, Dark Markets and Exploit kits

Lecture 31 Governments, spies and secret stuff part I

Lecture 32 Governments, spies and secret stuff part II

Lecture 33 Regulating encryption, mandating insecurity & legalizing spying

Lecture 34 Trust & Backdoors

Lecture 35 Censorship

Lecture 36 Cyber Threat Intelligence – Stay Informed

Section 4: Encryption Crash Course

Lecture 37 Goals and Learning Objectives

Lecture 38 Symmetric Encryption

Lecture 39 Asymmetric Encryption

Lecture 40 Hash Functions

Lecture 41 Digital Signatures

Lecture 42 Secure Sockets Layer (SSL) and Transport layer security (TLS)

Lecture 43 SSL Stripping

Lecture 44 HTTPS (HTTP Secure)

Lecture 45 Digital Certificates

Lecture 46 Certificate Authorities and HTTPS

Lecture 47 End-to-End Encryption (E2EE)

Lecture 48 Steganography

Lecture 49 How Security and Encryption is Really Attacked

Section 5: Setting up a Testing Environment Using Virtual Machines (Lab)

Lecture 50 Goals and Learning Objectives

Lecture 51 Introduction to Setting up a Testing Environment Using Virtual Machines

Lecture 52 Vmware

Lecture 53 Virtual box

Lecture 54 Kali Linux 2018

Section 6: Operating System Security & Privacy (Windows vs Mac OS X vs Linux)

Lecture 55 Goals and Learning Objectives

Lecture 56 Security Features and Functionality

Lecture 57 Security Bugs and Vulnerabilities

Lecture 58 Usage Share

Lecture 59 Windows 10 - Privacy & Tracking

Lecture 60 Windows 10 - Disable tracking automatically

Lecture 61 Windows 10 - Tool : Disable Windows 10 Tracking

Lecture 62 Windows 10 – Cortana

Lecture 63 Windows 10 – Privacy Settings

Lecture 64 Windows 10 - WiFi Sense

Lecture 65 Windows 7, 8 and 8.1 - Privacy & Tracking

Lecture 66 Mac - Privacy & Tracking

Lecture 67 Linux and Unix “like” Operating systems

Lecture 68 General Use Operating Systems (Windows, MacOS and Linux)

Lecture 69 General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)

Lecture 70 Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)

Lecture 71 Anonymity Focused Operating Systems (Tails and Whonix OS)

Lecture 72 Penetration Testing and Ethical Hacking Focused Operating Systems

Lecture 73 Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)

Lecture 74 Linux - Debian 8 Jessie - Virtual box guest additions Issue

Section 7: Security Bugs and Vulnerabilities

Lecture 75 Goals and Learning Objectives

Lecture 76 The Importance of Patching

Lecture 77 Windows 7 - Auto Update

Lecture 78 Windows 8 & 8.1 - Auto Update

Lecture 79 Windows 10 - Auto Update

Lecture 80 Windows - Criticality and Patch Tuesday

Lecture 81 Windows 7, 8, 8.1 & 10 - Automate the pain away from patching

Lecture 82 Linux - Debian - Patching

Lecture 83 Mac - Patching

Lecture 84 Firefox - Browser and extension updates

Lecture 85 Chrome - Browser and extension updates

Lecture 86 IE and Edge - Browser and extention updates

Lecture 87 Auto updates - The Impact to privacy and anonymity

Section 8: Reducing Threat Privilege

Lecture 88 Goals and Learning Objectives - Removing Privilege

Lecture 89 Windows 7 - Not using admin

Lecture 90 Windows 8 and 8.1 - Not using admin

Lecture 91 Windows 10 - Not using admin

Section 9: Social Engineering and Social Media Offence and Defence

Lecture 92 Goals and Learning Objectives

Lecture 93 Information Disclosure and Identity Strategies for Social Media

Lecture 94 Identify Verification and Registration

Lecture 95 Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1

Lecture 96 Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2

Lecture 97 Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)

Section 10: Security Domains

Lecture 98 Goals and Learning Objectives

Lecture 99 Security Domains

Section 11: Security Through Isolation and Compartmentalization

Lecture 100 Goals and Learning Objectives

Lecture 101 Introduction to Isolation and Compartmentalization

Lecture 102 Physical and Hardware Isolation - How to change the Mac Address

Lecture 103 Physical and Hardware Isolation - Hardware Serials

Lecture 104 Virtual Isolation

Lecture 105 Dual Boot

Lecture 106 Built-in Sandboxes and Application Isolation

Lecture 107 Windows - Sandboxes and Application Isolation

Lecture 108 Windows - Sandboxes and Application Isolation - Sandboxie

Lecture 109 Linux - Sandboxes and Application Isolation

Lecture 110 Mac - Sandboxes and Application Isolation

Lecture 111 Virtual Machines

Lecture 112 Virtual Machine Weaknesses

Lecture 113 Virtual Machine Hardening

Lecture 114 Whonix OS - Anonymous Operating system

Lecture 115 Whonix OS - Weaknesses

Lecture 116 Qubes OS

Lecture 117 Security Domains, Isolation and Compartmentalization

Section 12: Wrap Up

Lecture 118 Congratulations

Lecture 119 Certificate Of Completion for CPEs

Lecture 120 Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys)

Lecture 121 Sample from Vol 2 - Password cracking part 2

Lecture 122 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3

Lecture 123 Sample from Vol 4 - Email clients, protocols and authentication

Section 13: BONUS Section

Lecture 124 BONUS - How to Start a Career in Cyber Security

This course is for anyone who wants to become an expert in security, privacy, and anonymity. This volume covers the required foundation building blocks of that skillset.,For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats.,This course is for anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys.,For beginners and intermediate Internet users who are interested in security, safety, and privacy.,For those who want privacy and anonymity online from hackers, corporations and governments.,This course is designed for personal and home Internet security, privacy, and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal Internet security, privacy and anonymity.